security.go 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157
  1. package controller
  2. import (
  3. "encoding/json"
  4. "errors"
  5. "net/http"
  6. "strings"
  7. "github.com/gorilla/mux"
  8. "github.com/gravitl/netmaker/database"
  9. "github.com/gravitl/netmaker/functions"
  10. "github.com/gravitl/netmaker/logic"
  11. "github.com/gravitl/netmaker/models"
  12. "github.com/gravitl/netmaker/servercfg"
  13. )
  14. func securityCheck(reqAdmin bool, next http.Handler) http.HandlerFunc {
  15. return func(w http.ResponseWriter, r *http.Request) {
  16. var errorResponse = models.ErrorResponse{
  17. Code: http.StatusUnauthorized, Message: "W1R3: It's not you it's me.",
  18. }
  19. var params = mux.Vars(r)
  20. bearerToken := r.Header.Get("Authorization")
  21. if strings.Contains(r.RequestURI, "/dns") && strings.ToUpper(r.Method) == "GET" && authenticateDNSToken(bearerToken) {
  22. // do dns stuff
  23. r.Header.Set("user", "nameserver")
  24. networks, _ := json.Marshal([]string{ALL_NETWORK_ACCESS})
  25. r.Header.Set("networks", string(networks))
  26. next.ServeHTTP(w, r)
  27. }
  28. err, networks, username := SecurityCheck(reqAdmin, params["networkname"], bearerToken)
  29. if err != nil {
  30. if strings.Contains(err.Error(), "does not exist") {
  31. errorResponse.Code = http.StatusNotFound
  32. }
  33. errorResponse.Message = err.Error()
  34. returnErrorResponse(w, r, errorResponse)
  35. return
  36. }
  37. networksJson, err := json.Marshal(&networks)
  38. if err != nil {
  39. errorResponse.Message = err.Error()
  40. returnErrorResponse(w, r, errorResponse)
  41. return
  42. }
  43. r.Header.Set("user", username)
  44. r.Header.Set("networks", string(networksJson))
  45. next.ServeHTTP(w, r)
  46. }
  47. }
  48. // SecurityCheck - checks token stuff
  49. func SecurityCheck(reqAdmin bool, netname string, token string) (error, []string, string) {
  50. var hasBearer = true
  51. var tokenSplit = strings.Split(token, " ")
  52. var authToken = ""
  53. if len(tokenSplit) < 2 {
  54. hasBearer = false
  55. } else {
  56. authToken = tokenSplit[1]
  57. }
  58. userNetworks := []string{}
  59. //all endpoints here require master so not as complicated
  60. isMasterAuthenticated := authenticateMaster(authToken)
  61. username := ""
  62. if !hasBearer || !isMasterAuthenticated {
  63. userName, networks, isadmin, err := logic.VerifyUserToken(authToken)
  64. username = userName
  65. if err != nil {
  66. return errors.New("error verifying user token"), nil, username
  67. }
  68. if !isadmin && reqAdmin {
  69. return errors.New("you are unauthorized to access this endpoint"), nil, username
  70. }
  71. userNetworks = networks
  72. if isadmin {
  73. userNetworks = []string{ALL_NETWORK_ACCESS}
  74. } else {
  75. networkexists, err := functions.NetworkExists(netname)
  76. if err != nil && !database.IsEmptyRecord(err) {
  77. return err, nil, ""
  78. }
  79. if netname != "" && !networkexists {
  80. return errors.New("this network does not exist"), nil, ""
  81. }
  82. }
  83. } else if isMasterAuthenticated {
  84. userNetworks = []string{ALL_NETWORK_ACCESS}
  85. }
  86. if len(userNetworks) == 0 {
  87. userNetworks = append(userNetworks, NO_NETWORKS_PRESENT)
  88. }
  89. return nil, userNetworks, username
  90. }
  91. //Consider a more secure way of setting master key
  92. func authenticateMaster(tokenString string) bool {
  93. return tokenString == servercfg.GetMasterKey()
  94. }
  95. //Consider a more secure way of setting master key
  96. func authenticateDNSToken(tokenString string) bool {
  97. tokens := strings.Split(tokenString, " ")
  98. if len(tokens) < 2 {
  99. return false
  100. }
  101. return tokens[1] == servercfg.GetDNSKey()
  102. }
  103. // ValidateUserToken - self explained
  104. func ValidateUserToken(token string, user string, adminonly bool) error {
  105. var tokenSplit = strings.Split(token, " ")
  106. //I put this in in case the user doesn't put in a token at all (in which case it's empty)
  107. //There's probably a smarter way of handling this.
  108. var authToken = "928rt238tghgwe@TY@$Y@#WQAEGB2FC#@HG#@$Hddd"
  109. if len(tokenSplit) > 1 {
  110. authToken = tokenSplit[1]
  111. } else {
  112. return errors.New("Missing Auth Token.")
  113. }
  114. username, _, isadmin, err := logic.VerifyUserToken(authToken)
  115. if err != nil {
  116. return errors.New("Error Verifying Auth Token")
  117. }
  118. isAuthorized := false
  119. if adminonly {
  120. isAuthorized = isadmin
  121. } else {
  122. isAuthorized = username == user || isadmin
  123. }
  124. if !isAuthorized {
  125. return errors.New("You are unauthorized to access this endpoint.")
  126. }
  127. return nil
  128. }
  129. func continueIfUserMatch(next http.Handler) http.HandlerFunc {
  130. return func(w http.ResponseWriter, r *http.Request) {
  131. var errorResponse = models.ErrorResponse{
  132. Code: http.StatusUnauthorized, Message: "W1R3: This doesn't look like you.",
  133. }
  134. var params = mux.Vars(r)
  135. var requestedUser = params["username"]
  136. if requestedUser != r.Header.Get("user") {
  137. returnErrorResponse(w, r, errorResponse)
  138. return
  139. }
  140. next.ServeHTTP(w, r)
  141. }
  142. }